Acer Nitro 5 mavi ekran hatası

Paylaşıma açık upload et.

Merhaba bu sabah yine yaşadım sorunu

VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video Memory Manager encountered a condition that it can't recover from. By crashing,
The video Memory Manager is attempting to get enough information into the minidump such that.
Somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 000000000000002D, the subtype of the bugcheck:
Arg2: FFFF8083FF1EF210.
Arg3: FfFF8083FF4F7D50.
Arg4: Ffffbd8B66C86Ff8.

Debugging details:
------------------

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 2125.

Key: Analysis. Elapsed. Msec.
Value: 5836.

Key: Analysis. IO. Other. MB.
Value: 10.

Key: Analysis. IO. Read. MB.
Value: 1

Key: Analysis. IO. Write. MB.
Value: 24.

Key: Analysis. Init. CPU. Msec.
Value: 984.

Key: Analysis. Init. Elapsed. Msec.
Value: 126480.

Key: Analysis. Memory.commitpeak. MB.
Value: 91.

Key: Analysis. Version. Dbgeng.
Value: 10.0.27725.1000

Key: Analysis. Version. Description.
Value: 10.2408.27.01 AMD64fre.

Key: Analysis. Version. Ext.
Value: 1.2408.27.1

Key: Bugcheck. Code. Legacyapı.
Value: 0x10e.

Key: Bugcheck. Code. Targetmodel.
Value: 0x10e.

Key: Dump. Attributes. Asulong.
Value: 21008.

Key: Dump. Attributes. Diagdatawrittentoheader
Value: 1

Key: Dump. Attributes. Errorcode.
Value: 0

Key: Dump. Attributes. Kernelgeneratedtriagedump
Value: 1

Key: Dump. Attributes. Lastline.
Value: Dump completed successfully.

Key: Dump. Attributes. Progresspercentage.
Value: 0

Key: Failure. Bucket.
Value: 0x10e_2d_dxgmms2! Vıdmm_page_table_base: Getcpuvisibleaddress.

Key: Failure. Hash.
Value: {CA00CB12-3CE5-2E41-C763-7F0F8a8fbadd}

Bugcheck_code: 10e.

Bugcheck_p1: 2D.

Bugcheck_p2: FFFF8083FF1EF210.

Bugcheck_p3: FfFF8083FF4F7D50.

Bugcheck_p4: Ffffbd8B66C86Ff8.

Fıle_ın_cab: 022125-16921-01.dmp

Dump_fıle_attrıbutes: 0x21008.
Kernel generated triage dump.

Faultıng_thread: Ffff9D060F0F2180.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxpnp: 1 (!blackboxpnp)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: System.

Stack_text:
Ffffbd8b'66C86ef8 fffff800'7B2B1316: 00000000'0000010E 00000000'0000002D ffff8083'FF1ef210 ffff8083'FF4F7D50: NT! Kebugcheckex.
Ffffbd8b'66C86F00 fffff800'9016D66E: Ffff9D06'0C310300 ffff8084'12efc350 00000000'00000000 ffff9D06'0F0F2180: Watchdog! Wdlogsingleentry5+0x156
Ffffbd8b'66C86F90 fffff800'9013B8EA: Ffff9D06'00010000 fffff800'E9676499 ffffbd8b'66C871a0 ffff8084'0fff94D0: Dxgmms2! Vıdmm_page_table_base: Getcpuvisibleaddress+0x9'de
Ffffbd8b'66C87070 fffff800'9013B104: 00000000'00000001 00000000'00000002 00000000'00000200 ffff9D06'0F1BF000: Dxgmms2! Vıdmm_page_table_base: Getdriverupdateaddress+0x66
Ffffbd8b'66C870e0 fffff800'901604E3: Ffff8083'FF3B12a0 ffff8083'FF3B12a0 ffffbd8b'66C87620 00000000'00000000: Dxgmms2! Vıdmm_page_table: Commitvirtualaddressrange+0x4C4
Ffffbd8b'66C871F0 fffff800'9016024F: Ffff8083'FF215A30 ffff8083'FF3B12a0 ffffbd8b'66C87620 00000000'00000000: Dxgmms2! Vıdmm_page_dırectory: Commitvirtualaddressrange+0x683
Ffffbd8b'66C873a0 fffff800'90144C24: Ffff8083'FF215300 ffff8083'FF3B12a0 ffffbd8b'66C87620 00000000'00000000: Dxgmms2! Vıdmm_page_dırectory: Commitvirtualaddressrange+0x3ef
Ffffbd8b'66C87550 fffff800'90189A8B: 00000000'00000000 fffffc49'89249071 00000000'00000000 00000000'00000000: Dxgmms2! Cvirtualaddressallocator: Commitvirtualaddressrange+0x994
Ffffbd8b'66C876e0 fffff800'90133D98: 00000000'00000000 00000000'00000000 00000000'00000004 ffffbd8b'66C87910: Dxgmms2! Vıdmm_global: Initpagingprocessvaspace+0x213
Ffffbd8b'66C87880 fffff800'9013538C: Ffff9D06'0F1BF000 ffff8083'FF3B14b0 ffff8083'FF3B14b0 ffff8083'FD43FE30: Dxgmms2! Vıdmm_global: Processsystemcommand+0x500
Ffffbd8b'66C87980 fffff800'E985594A: Ffff8083'F55EA000 fffff800'90134901 ffffad81'10fb9100 066FE47F'BD9bbf02: Dxgmms2! Vidmmworkerthreadproc+0x9CC
Ffffbd8b'66C87b30 fffff800'e9a7a004: Ffffad81'10fb9180 ffff9D06'0F0F2180 fffff800'E98558F0 FF4ee9F3'8B440D74: NT! Pspsystemthreadstartup+0x5a
Ffffbd8b'66C87b80 00000000'00000000: Ffffbd8b'66C88000 ffffbd8b'66C81000 00000000'00000000 00000000'00000000: NT! Kistartsystemthread+0x34

Symbol_name: Dxgmms2! Vıdmm_page_table_base: Getcpuvisibleaddress+9'de

Module_name: Dxgmms2.

Image_name: dxgmms2.sys

Image_versıon: 10.0.26100.3037

Stack_command: Process /r /p 0xffff9d06006d6040;.thread 0xffff9d060f0f2180; KB.

Bucket_ıd_func_offset: 9'de.

Faılure_bucket_ıd: 0x10e_2d_dxgmms2! Vıdmm_page_table_base: Getcpuvisibleaddress.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {CA00CB12-3CE5-2E41-C763-7F0F8a8fbadd}

Followup: Machineowner.
---------

2: Kd> lmvm dxgmms2.
Browse full module list.
Start end module name.
Fffff800'90080000 fffff800'901A9000 dxgmms2 (pdb symbols) C:\ProgramData\Dbg\sym\dxgmms2.pdb\C05818BA799967435DCF6711A7B8CEFE1\dxgmms2.pdb
Loaded symbol image file: dxgmms2.sys
Mapped Memory image file: C:\ProgramData\Dbg\sym\dxgmms2.sys\C56342F9129000\dxgmms2.sys
Image path: dxgmms2.sys
Image name: dxgmms2.sys
Browse all global symbols functions data symbol reload.
Image was built with /brepro flag.
Timestamp: C56342F9 (this is a reproducible Build file hash, not a timestamp)
Checksum: 0012D485.
Imagesize: 00129000.
File version: 10.0.26100.3037
Product version: 10.0.26100.3037
File flags: 0 (mask 3F)
File OS: 40004 NT Win32.
File type: 3.7 driver.
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
Companyname: Microsoft Corporation.
Productname: Microsoft® windows® operating System.
Internalname: dxgmms2.sys
Originalfilename: dxgmms2.sys
Productversion: 10.0.26100.3037
Fileversion: 10.0.26100.3037 (winbuild.160101.0800)
Filedescription: DirectX Graphics mms.
Legalcopyright: © Microsoft Corporation. All rights reserved.
2: Kd>
Browse full module list.
Start end module name.
Fffff800'90080000 fffff800'901A9000 dxgmms2 (pdb symbols) C:\ProgramData\Dbg\sym\dxgmms2.pdb\C05818BA799967435DCF6711A7B8CEFE1\dxgmms2.pdb
Loaded symbol image file: dxgmms2.sys
Mapped Memory image file: C:\ProgramData\Dbg\sym\dxgmms2.sys\C56342F9129000\dxgmms2.sys
Image path: dxgmms2.sys
Image name: dxgmms2.sys
Browse all global symbols functions data symbol reload.
Image was built with /brepro flag.
Timestamp: C56342F9 (this is a reproducible Build file hash, not a timestamp)
Checksum: 0012D485.
Imagesize: 00129000.
File version: 10.0.26100.3037
Product version: 10.0.26100.3037
File flags: 0 (mask 3F)
File OS: 40004 NT Win32.
File type: 3.7 driver.
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
Companyname: Microsoft Corporation.
Productname: Microsoft® windows® operating System.
Internalname: dxgmms2.sys
Originalfilename: dxgmms2.sys
Productversion: 10.0.26100.3037
Fileversion: 10.0.26100.3037 (winbuild.160101.0800)
Filedescription: DirectX Graphics mms.
Legalcopyright: © Microsoft Corporation. All rights reserved.
2: Kd>
Browse full module list.
Start end module name.
Fffff800'90080000 fffff800'901A9000 dxgmms2 (pdb symbols) C:\ProgramData\Dbg\sym\dxgmms2.pdb\C05818BA799967435DCF6711A7B8CEFE1\dxgmms2.pdb
Loaded symbol image file: dxgmms2.sys
Mapped Memory image file: C:\ProgramData\Dbg\sym\dxgmms2.sys\C56342F9129000\dxgmms2.sys
Image path: dxgmms2.sys
Image name: dxgmms2.sys
Browse all global symbols functions data symbol reload.
Image was built with /brepro flag.
Timestamp: C56342F9 (this is a reproducible Build file hash, not a timestamp)
Checksum: 0012D485.
Imagesize: 00129000.
File version: 10.0.26100.3037
Product version: 10.0.26100.3037
File flags: 0 (mask 3F)
File OS: 40004 NT Win32.
File type: 3.7 driver.
File date: 00000000.00000000
Translations: 0409.04b0
Information from resource tables:
Companyname: Microsoft Corporation.
Productname: Microsoft® windows® operating System.
Internalname: dxgmms2.sys
Originalfilename: dxgmms2.sys
Productversion: 10.0.26100.3037
Fileversion: 10.0.26100.3037 (winbuild.160101.0800)
Filedescription: DirectX Graphics mms.
Legalcopyright: © Microsoft Corporation. All rights reserved.
 

Technopat Haberler

Yeni konular

Geri
Yukarı